Open In App

How to Defend Against Password Cracking of Systems?

To Defend against Password Cracking of systems in Ethical Hacking, you need to know how password cracking functions. Password cracking is the act of using a computer program to try to guess an inputted password. There are many forms of attacks that can be used in this process, but they all result in the same goal of trying to gain access to an account without knowing what the true master password is. This may seem like a low-priority problem for systems administrators, as there are other security measures that can mitigate this risk; however, it’s important for ethical hackers to understand how password cracking functions and how defenses against these attacks can be put into place by properly configuring software firewalls and operating systems.

 

Password Policies:

Password Screening:

The following are the password screening tests that should be carried out before it is allowed to enter into a system.



Password Cracking Function:

The attack only works against systems that use password-based authentication to gain access. Typical security measures that administrators implement in order to secure their systems can be bypassed by a password cracker. For example, if the administrator forgets his password and leaves his login details on a sticky note on the desktop, an attacker could easily use this method to gain access to the system.

This is because a password cracker attempts to guess passwords based on patterns, which can be deduced from words that appear in previous passwords that have already been guessed or are known by an attacker through some other means.



Prevention From Password Attacks:

To defend against a password cracking attack, the software firewall should be configured in such a way that it will intelligently randomize the characters of any passwords, utilizing non-standard character sets such as uppercase and lower case letters, numbers, and symbol characters. The goal is to make it as difficult as possible for an attacker to figure out a pattern. A standard keyboard utilizes only 26 letters in English alphabetical order; however, special applications can easily allow for more non-standard characters to be used when inputting text fields.

The operating system should be configured to not store passwords in plaintext so that if they are somehow compromised on the local computer, they will still remain encrypted when accessed from another system.

Types of Attacks in Password Cracking:

Some of the most common methods of password cracking are brute-force attacks and dictionary attacks, both of which can be used in password cracking against all types of systems. Brute force is the process of guessing passwords based on the numerical character sets that are available on those systems. For example, if a system utilizes a numeric keyboard, it would not be possible to use lower case letters unless you’ve changed your keyboard layout, which is not feasible for most users. Dictionary attacks passwords based on words that appear in certain combinations.

Defend Against Password Cracking:

In order to defend against password cracking, the following should be taken into consideration:

Article Tags :